Author:Malatji, Tsholofelo MDate:Sep 2017Infrared (IR) guided missiles remain a threat to both military and civilian aircraft, and as such, the development of effective countermeasures against this threat remains vital. A simulation has been developed to assess the effectiveness of ...Read more
Author:Owen, GR; Stoychev, Stoyan H; Achilonu, I; Dirr, HWDate:Mar 2013JNK1 is activated by phosphorylation of the canonical T183 and Y185 residues, modifications that are catalysed typically by the upstream eukaryotic kinases MKK4 and MKK7. Nonetheless, the exact sites at which the most abundant JNK variant, ...Read more
Author:Ramadeen, P; Uys, D; Duvenhage, ADate:01 Sep 2010The command, control and information warfare competency of Defence, Peace, Safety and Security (DPSS), an operating unit of the CSIR is using systems modelling and simulation in its Joint Command and Control (JC2) research. JC2 encompasses ...Read more
Author:Godfrey, Linda K; Mean-Abela, CDate:2014Europe has the know-how, technology and legislative experience that could be of value to African countries as they build up their recycling structures, frameworks, and value-chains. Such a recycling partnership would promote a sector with a ...Read more
Author:De Freitas, A; De Villiers, Johan P; Nel, Willem AJDate:Jun 2015A target of interest measured by a high range resolution radar may be modelled by multiple dominant points of reflections referred to as dominant scatterers. In this study a non-linear state space setting is used to model the states and ...Read more
Author:Fuel Research InstituteDate:1958This paper covers washing data on Douglas Baum washed duff, raw duff from Transvaal Navigation Colliery, and contains analytical and other data on blend constituents and coke from blends containing Douglas swelling coal.Read more
Author:Olwal, TO; Djouani, K; Kogeda, OP; Van Wyk, BJDate:Sep 2012Wireless Backbone Networks (WBNs) equipped with Multi-Radio Multi-Channel (MRMC) configurations do experience power control problems such as inter-channel and co-channel interference, high energy consumption at the multiple queues and unscalable ...Read more
Author:Chapman, ADate:Sep 2007By the 1850s, European settlers were over-exploiting of South Africa’s indigenous forest resources for timber. As a result of rising concerns, authorities began a programme of afforestation (usually a grassland or fynbos conversion) using ...Read more
Author:Slingsby, JA; De Buys, A; Simmers, ADA; Prinsloo, E; Forsyth, Gregory G; Glenday, J; Allsopp, NDate:Apr 2021The Jonkershoek Forestry Research Station was established in the Mediterranean climate region of South Africa in 1935 to implement a multiple catchment experiment to determine the effects of afforestation on water yield. The experiment consists ...Read more
Author:Mtsweni, Jabu SDate:Mar 2022Cybersecurity has evolved over the years, and today cyberattacks instigated by cyber-criminals, nation states, or insider threat actors are part of regular headline news. In South Africa and around the world, the number of cyberattacks or ...Read more
Author:Bosscha, Peter ADate:Nov 2022The development, manufacturing and deployment of a South African engineered Continuous Positive Airway Pressure Ventilator is described. The CSIR L.I.F.E. (Lung Inspiratory Flow Enabler) Ventilator was developed during the COVID Pandemic in ...Read more
Author:Gledhill, Irvy MA; Diale, M; Tibane, MM; Maphanga, RR; Thaoge, MLDate:Aug 2014The progress from 2005 to now is evident. The journey has been a slow uphill with numbers increasing in the country. Different universities have graduated a woman in physics PhD while there are women professors in different institutions. ...Read more
Author:Diale, M; Maphang, RR; Tibane, MM; Thaoge, ML; Gledhil, IDate:Aug 2014The progress from 2005 to now is evident. The journey has been a slow uphill with numbers increasing in the country. Government structures have recognized the importance of women in science that the Department of Science and Technology (DST) ...Read more
Author:Linklater, G; Smith, C; Connan, J; Herbert, A; Irwin, Barry VWDate:Sep 2017Attribute-based Access Control (ABAC) is an access control model where authorization for an action on a resource is determined by evaluating attributes of the subject, resource (object) and environment. The attributes are evaluated against ...Read more
Author:Muswelanto, S; Van Deventer, Martha J; Van der Merwe, AdèleDate:Jul 2009With the establishment of an Institutional Repository (IR) one of the first questions the organisation should ask is: ‘How could we promote Open Access (OA) and still adhere to the restrictions of copyright? The Council for Scientific and ...Read more
Author:Crouch, NR; Smith, GF; Walters, Michele; Figueiredo, EDate:2016A new Kalanchoe species, K. winteri Gideon F.Sm., N.R.Crouch & Mich.Walters, is described from rocky grasslands of the Wolkberg region of Limpopo province, South Africa. The species is closely allied to both K. thyrsiflora Harv. and K. luciae ...Read more
Author:Burger, L; Forbes, ADate:Aug 2008The authors apply a new method of modeling Porro prism resonators, using the concept of rotating loss screens, to study stable and unstable Porro prism resonator. They show that the previously observed petal–like modal output is in fact only ...Read more
Author:Cowling, RM; Roux, PWDate:1987This volume is the second in a series of syntheses of existing knowledge of the karoo biome. The first volume summarized what is currently known on the physical environment of the biome namely geology, soils, climate, hydrology, geohydrology ...Read more